Martin Pirker

Orcid: 0000-0003-3517-5479

According to our database1, Martin Pirker authored at least 32 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Distributed Information Security Auditing Using Blockchains .
ERCIM News, 2024

A Brief Reflection on Trusted Platform Module Support.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

The State of Boot Integrity on Linux - a Brief Review.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
DISA - A Blockchain-Based Distributed Information Security Audit.
Proceedings of the Information Integration and Web Intelligence, 2023

2022
A Revisit of Attestable Nodes for Networked Applications.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Securing the Linux Boot Process: From Start to Finish.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Towards Resilient Artificial Intelligence: Survey and Research Issues.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A Curious Exploration of Malicious PDF Documents.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Revisiting the Challenges of Input Parsing for Robust and Secure Software.
Proceedings of the International Conference on Software Security and Assurance, 2019

2018
Behavioural Comparison of Systems for Anomaly Detection.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Creation and Integration of Remote High Interaction Honeypots.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
A Work-Flow for Empirical Exploration of Security Events.
Proceedings of the 25th International Conference on World Wide Web, 2016

Assessment of Server State via Inter-Clone Differences.
Proceedings of the International Conference on Software Security and Assurance, 2016

2014
Agent-Based Cloud Resource Management for Secure Cloud Infrastructures.
Comput. Informatics, 2014

Security concepts for a distributed architecture for activity logging and analysis.
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014

2013
Position Paper: A Path Towards Ubiquitous Protection of Media.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013

Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Trusted Identity Management for Overlay Networks.
Proceedings of the Information Security Practice and Experience, 2013

2012
A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Lightweight Distributed Heterogeneous Attested Android Clouds.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Waltzing the Bear, or: A Trusted Virtual Security Module.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

Lightweight Distributed Attestation for the Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Management of Integrity-Enforced Virtual Applications.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

A Flexible Software Development and Emulation Framework for ARM TrustZone.
Proceedings of the Trusted Systems - Third International Conference, 2011

2010
Towards a Virtual Trusted Platform.
J. Univers. Comput. Sci., 2010

Dynamic Enforcement of Platform Integrity.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity.
Proceedings of the Trusted Systems - Second International Conference, 2010

2009
A PrivacyCA for Anonymity and Trust.
Proceedings of the Trusted Computing, 2009

2008
Towards Trust Services for Language-Based Virtual Machines for Grid Computing.
Proceedings of the Trusted Computing, 2008

2007
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007


  Loading...